Wireless Security Commands; Table 21: Wireless Security Commands - SMC Networks SMC2890W-AN Management Manual

802.11a/b/g/n outdoor dual-band wireless access point
Hide thumbs Also See for SMC2890W-AN:
Table of Contents

Advertisement

25
auth

Wireless Security Commands

The commands described in this section configure parameters for wireless security
on the VAP interfaces.

Table 21: Wireless Security Commands

Command
Function
auth
Defines the 802.11 authentication type allowed by the
access point
encryption
Defines whether or not WEP encryption is used to
provide privacy for wireless communications
key
Sets the keys used for WEP encryption
transmit-key
Sets the index of the key to be used for encrypting
data frames sent between the access point and
wireless clients
cipher-suite
Selects an encryption method for the global key used
for multicast and broadcast traffic
wpa-pre-shared-key
Defines a WPA preshared-key value
pmksa-lifetime
Sets the lifetime PMK security associations
make-security-effective
Implements wireless security changes made in
current CLI session
This command configures authentication for the VAP interface.
Syntax
auth <open-system | shared-key | wpa | wpa-psk | wpa2 | wpa2-psk | wpa-
wpa2-mixed | wpa-wpa2-psk-mixed>
open-system - Accepts the client without verifying its identity using a
shared key. "Open" authentication means either there is no encryption (if
encryption is disabled) or WEP-only encryption is used (if encryption is
enabled).
shared-key - Authentication is based on a WEP shared key that has been
distributed to all stations.
wpa - Clients using WPA are accepted for authentication.
wpa-psk - Clients using WPA with a Pre-shared Key are accepted for
authentication.
wpa2 - Clients using WPA2 are accepted for authentication.
– 232 –
Mode
Page
IC-W-
235
VAP
IC-W-
234
VAP
IC-W
235
IC-W-
236
VAP
IC-W-
237
VAP
IC-W-
238
VAP
239
IC-W-
VAP
IC-W-
239
VAP

Advertisement

Table of Contents
loading

This manual is also suitable for:

Smc2891w-an

Table of Contents